Posts tagged 'hosting' – Page 2

architecture

Access 1: Dialing into Access Control

Our work on Identity is ultimately for controlling access to online services. We now introduce our thoughts on Access Control. The whole story is complex, but an analogy to the phone system can help to explain it.

>> Continue reading <<

architecture

Identity 16: Support Levels for Realm Crossover

The essential game of Realm Crossover is one of juggling realms as part of identities. This brings us a number of "support levels" that we could describe. This forms an interesting perspective on the growing path of the InternetWide Architecture.

>> Continue reading <<

networking

Networking #2: Reliable Peering over 6bed4

For client-server networking, NAT traversal is a solved problem. For peer-to-peer networks it is not possible to do in general, but the potential of these networks in the liberation of users from "central" services is quite big. The 6bed4 tunnel allows applications to be designed as peer-to-peer IPv6 applications with only a fallback (to your own tunnel server) if necessary.

>> Continue reading <<

networking

Networking #1: Backward Compatible with IPv4

IPv6 brings benefits in terms of network address policy, peer-to-peer support and privacy. By reducing IPv4 to backward compatibility we set the tone for a long-overdue transition. The approach given below makes it very attractive too; full IPv6 benefits for those who make the effort to at least install a tunnel, with fully reliable client-server usage patterns for those who stick to IPv4.

>> Continue reading <<

architecture

Reservoir: Your Data reaching out to You

Many of us rely on "cloud" storage services. They enable us to access the same files from everywhere, but they are fairly dumb and leave all the thinking to people. ARPA2 Reservoir is different, in that it supports metadata, automation and integration in your tools.

>> Continue reading <<